default search action
Qinming He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Lingling Lu, Zhenyu Wen, Ye Yuan, Qinming He, Jianhai Chen, Zhenguang Liu:
ANNProof: Building a verifiable and efficient outsourced approximate nearest neighbor search system on blockchain. Future Gener. Comput. Syst. 156: 206-220 (2024) - [c63]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-Image Backdoor Attacks. ICANN (10) 2024: 187-202 - [c62]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. ICDE 2024: 1972-1985 - [c61]Xing Li, Xiaochong Jiang, Ye Yang, Lilong Chen, Yi Wang, Chao Wang, Chao Xu, Yilong Lv, Bowen Yang, Taotao Wu, Haifeng Gao, Zikang Chen, Yisong Qiao, Hongwei Ding, Yijian Dong, Hang Yang, Jianming Song, Jianyuan Lu, Pengyu Zhang, Chengkun Wei, Zihui Zhang, Wenzhi Chen, Qinming He, Shunmin Zhu:
Triton: A Flexible Hardware Offloading Architecture for Accelerating Apsara vSwitch in Alibaba Cloud. SIGCOMM 2024: 750-763 - [c60]Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He:
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis. USENIX Security Symposium 2024 - [c59]Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He:
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. USENIX Security Symposium 2024 - [i16]Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang:
Clean-image Backdoor Attacks. CoRR abs/2403.15010 (2024) - 2023
- [j29]Lingling Lu, Zhenyu Wen, Ye Yuan, Binru Dai, Peng Qian, Changting Lin, Qinming He, Zhenguang Liu, Jianhai Chen, Rajiv Ranjan:
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform. IEEE Trans. Dependable Secur. Comput. 20(6): 4578-4592 (2023) - [j28]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. IEEE Trans. Inf. Forensics Secur. 18: 1237-1251 (2023) - [j27]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Software Eng. 49(7): 3793-3810 (2023) - [c58]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. ICDE 2023: 1747-1760 - [c57]Haonan Hu, Dazhong Rong, Jianhai Chen, Qinming He, Zhenguang Liu:
CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-Start Problem of Recommendation. KSEM (3) 2023: 213-225 - [c56]Peng Qian, Zhenguang Liu, Yifang Yin, Qinming He:
Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode. WWW 2023: 2220-2229 - [i15]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. CoRR abs/2301.03943 (2023) - [i14]Haonan Hu, Dazhong Rong, Jianhai Chen, Qinming He, Zhenguang Liu:
CoMeta: Enhancing Meta Embeddings with Collaborative Information in Cold-start Problem of Recommendation. CoRR abs/2303.07607 (2023) - [i13]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. CoRR abs/2304.12645 (2023) - [i12]Peng Qian, Rui Cao, Zhenguang Liu, Wenqing Li, Ming Li, Lun Zhang, Yufeng Xu, Jianhai Chen, Qinming He:
Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair. CoRR abs/2309.02391 (2023) - [i11]Peng Qian, Hanjie Wu, Zeren Du, Turan Vural, Dazhong Rong, Zheng Cao, Lun Zhang, Yanbin Wang, Jianhai Chen, Qinming He:
MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing. CoRR abs/2312.04512 (2023) - 2022
- [j26]Zhengjie Huang, Zhenguang Liu, Jianhai Chen, Qinming He, Shuang Wu, Lei Zhu, Meng Wang:
Who is gambling? Finding cryptocurrency gamblers using multi-modal retrieval methods. Int. J. Multim. Inf. Retr. 11(4): 539-551 (2022) - [c55]Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, Qinming He:
FedRecAttack: Model Poisoning Attack to Federated Recommendation. ICDE 2022: 2643-2655 - [c54]Dazhong Rong, Qinming He, Jianhai Chen:
Poisoning Deep Learning Based Recommender Model in Federated Learning Scenarios. IJCAI 2022: 2204-2210 - [i10]Dazhong Rong, Shuai Ye, Ruoyan Zhao, Hon Ning Yuen, Jianhai Chen, Qinming He:
FedRecAttack: Model Poisoning Attack to Federated Recommendation. CoRR abs/2204.01499 (2022) - [i9]Dazhong Rong, Qinming He, Jianhai Chen:
Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios. CoRR abs/2204.13594 (2022) - [i8]Peng Qian, Zhenguang Liu, Qinming He, Butian Huang, Duanzheng Tian, Xun Wang:
Smart Contract Vulnerability Detection Technique: A Survey. CoRR abs/2209.05872 (2022) - [i7]Zhengjie Huang, Yunyang Huang, Peng Qian, Jianhai Chen, Qinming He:
Demystifying Bitcoin Address Behavior via Graph Neural Networks. CoRR abs/2211.14582 (2022) - [i6]Zhengjie Huang, Zhenguang Liu, Jianhai Chen, Qinming He, Shuang Wu, Lei Zhu, Meng Wang:
Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal Retrieval Methods. CoRR abs/2211.14779 (2022) - 2021
- [j25]Fei Wu, Qinming He, Chao Wu:
AI+X micro-program fosters interdisciplinary skills in China. Commun. ACM 64(11): 52-54 (2021) - [j24]Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Jianhai Chen:
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining. IEEE Trans. Cybern. 51(10): 5198-5211 (2021) - [j23]Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, Yang Xiang:
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response. IEEE Trans. Mob. Comput. 20(9): 2728-2744 (2021) - [c53]Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, Qinming He:
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths. CCS 2021: 1627-1644 - [c52]Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, Liming Fang:
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining. ICDE 2021: 2583-2594 - [c51]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. IJCAI 2021: 2751-2759 - [i5]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i4]Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji:
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. CoRR abs/2106.09282 (2021) - 2020
- [j22]Peng Qian, Zhenguang Liu, Qinming He, Roger Zimmermann, Xun Wang:
Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models. IEEE Access 8: 19685-19695 (2020) - [c50]Yuan Zhuang, Zhenguang Liu, Peng Qian, Qi Liu, Xiang Wang, Qinming He:
Smart Contract Vulnerability Detection using Graph Neural Network. IJCAI 2020: 3283-3290
2010 – 2019
- 2019
- [j21]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [c49]Lingling Lu, Jianhai Chen, Zijun Tian, Qinming He, Butian Huang, Yang Xiang, Zhenguang Liu:
EduCoin: a Secure and Efficient Payment Solution for MOOC Environment. Blockchain 2019: 490-495 - [c48]Changjiang Li, Haiqin Weng, Shouling Ji, Jianfeng Dong, Qinming He:
DeT: Defending Against Adversarial Examples via Decreasing Transferability. CSS (1) 2019: 307-322 - [c47]Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, Ting Wang:
CATS: Cross-Platform E-Commerce Fraud Detection. ICDE 2019: 1874-1885 - [c46]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. INFOCOM 2019: 2557-2565 - [i3]Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. CoRR abs/1901.02978 (2019) - [i2]Shouling Ji, Haiqin Weng, Yiming Wu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
FDI: Quantifying Feature-based Data Inferability. CoRR abs/1902.00714 (2019) - [i1]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. CoRR abs/1902.00717 (2019) - 2018
- [j20]Haiqin Weng, Kevin Chiew, Zhenguang Liu, Qinming He, Roger Zimmermann:
Rare category exploration with noisy labels. Expert Syst. Appl. 114: 503-515 (2018) - [j19]Lianhang Ma, Kevin Chiew, Hao Huang, Qinming He:
Evaluation of local community metrics: from an experimental perspective. J. Intell. Inf. Syst. 51(1): 1-22 (2018) - [j18]Zhenguang Liu, Yingjie Xia, Qi Liu, Qinming He, Chao Zhang, Roger Zimmermann:
Toward Personalized Activity Level Prediction in Community Question Answering Websites. ACM Trans. Multim. Comput. Commun. Appl. 14(2s): 41:1-41:15 (2018) - [c45]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - [c44]Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Tianyu Du, Qinming He:
Online E-Commerce Fraud: A Large-Scale Detection and Analysis. ICDE 2018: 1435-1440 - 2017
- [j17]Shuang Wu, Qinming He, Jianhai Chen, Bei Wang, Butian Huang:
HHMO: A Hot-page Based Hybrid-copy Migration Optimization Method. Ad Hoc Sens. Wirel. Networks 38(1-4): 263-291 (2017) - [j16]Jianhai Chen, Qinming He, Deshi Ye, Wenzhi Chen, Yang Xiang, Kevin Chiew, Liangwei Zhu:
Joint affinity aware grouping and virtual machine placement. Microprocess. Microsystems 52: 365-380 (2017) - [j15]Butian Huang, Zhenguang Liu, Jianhai Chen, Anan Liu, Qi Liu, Qinming He:
Behavior pattern clustering in blockchain networks. Multim. Tools Appl. 76(19): 20099-20110 (2017) - [c43]Qian Yan, Hao Huang, Yunjun Gao, Wei Lu, Qinming He:
Group-Level Influence Maximization with Budget Constraint. DASFAA (1) 2017: 625-641 - 2016
- [j14]Zhenguang Liu, Kevin Chiew, Luming Zhang, Beibei Zhang, Qinming He, Roger Zimmermann:
Rare category exploration via wavelet analysis: Theory and applications. Expert Syst. Appl. 63: 173-186 (2016) - [j13]Bei Wang, Yuxia Cheng, Wenzhi Chen, Qinming He, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Efficient consolidation-aware VCPU scheduling on multicore virtualization platform. Future Gener. Comput. Syst. 56: 229-237 (2016) - [j12]Qingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu:
A formalized framework for incorporating expert labels in crowdsourcing environment. J. Intell. Inf. Syst. 47(3): 403-425 (2016) - [c42]Qian Yan, Hao Huang, Yunjun Gao, Chen Ying, Qingyang Hu, Tieyun Qian, Qinming He:
Modeling for Noisy Labels of Crowd Workers. APWeb (2) 2016: 227-238 - [c41]Hao Huang, Song Wang, Shuangke Wu, Yunjun Gao, Wei Lu, Qinming He, Shi Ying:
Mining Arbitrary Shaped Clusters and Outputting a High Quality Dendrogram. DEXA (1) 2016: 153-168 - [c40]Shuang Wu, Bei Wang, Ce Yang, Qinming He, Jianhai Chen:
A Hot-Page Aware Hybrid-Copy Migration Method. IC2E 2016: 220-221 - [c39]Bei Wang, Qinming He, Yuxia Cheng:
Evaluation of Virtual Machine Performance on Large Pages. ISPDC 2016: 440-442 - 2015
- [j11]Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew:
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks. Int. J. Commun. Syst. 28(1): 167-186 (2015) - [c38]Zhenguang Liu, Hao Huang, Qinming He, Kevin Chiew, Yunjun Gao:
Rare Category Exploration on Linear Time Complexity. DASFAA (2) 2015: 37-54 - [c37]Haiqin Weng, Zhenguang Liu, Kevin Chiew, Qinming He:
Rare Category Detection Forest. KSEM 2015: 612-618 - 2014
- [j10]Hao Huang, Kevin Chiew, Yunjun Gao, Qinming He, Qing Li:
Rare category exploration. Expert Syst. Appl. 41(9): 4197-4210 (2014) - [j9]Hao Huang, Yunjun Gao, Kevin Chiew, Qinming He, Baihua Zheng:
Unsupervised analysis of top-k core members in poly-relational networks. Expert Syst. Appl. 41(13): 5689-5701 (2014) - [j8]Zhenguang Liu, Kevin Chiew, Qinming He, Hao Huang, Butian Huang:
Prior-free rare category detection: More effective and efficient solutions. Expert Syst. Appl. 41(17): 7691-7706 (2014) - [j7]Feng Qian, Kevin Chiew, Qinming He, Hao Huang:
Mining regional co-location patterns with kNNG. J. Intell. Inf. Syst. 42(3): 485-505 (2014) - [j6]Lianhang Ma, Hao Huang, Qinming He, Kevin Chiew, Zhenguang Liu:
Toward seed-insensitive solutions to local community detection. J. Intell. Inf. Syst. 43(1): 183-203 (2014) - [c36]Hao Huang, Yunjun Gao, Kevin Chiew, Lei Chen, Qinming He:
Towards effective and efficient mining of arbitrary shaped clusters. ICDE 2014: 28-39 - [c35]Shuang Wu, Ce Yang, Jianhai Chen, Qinming He, Bei Wang:
DP: Dynamic Prepage in Postcopy Migration for Fixed-Size Data Load. NPC 2014: 530-533 - [c34]Qingyang Hu, Qinming He, Hao Huang, Kevin Chiew, Zhenguang Liu:
Learning from Crowds under Experts' Supervision. PAKDD (1) 2014: 200-211 - [c33]Zhenguang Liu, Hao Huang, Qinming He, Kevin Chiew, Lianhang Ma:
Rare Category Detection on O(dN) Time Complexity. PAKDD (2) 2014: 498-509 - [c32]Qingyang Hu, Kevin Chiew, Hao Huang, Qinming He:
Recovering Missing Labels of Crowdsourcing Workers. SDM 2014: 857-865 - 2013
- [j5]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qiang Yang, Qinming He:
EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks. J. Zhejiang Univ. Sci. C 14(5): 356-373 (2013) - [j4]Hao Huang, Qinming He, Kevin Chiew, Feng Qian, Lianhang Ma:
CLOVER: a faster prior-free approach to rare-category detection. Knowl. Inf. Syst. 35(3): 713-736 (2013) - [c31]Lianhang Ma, Hao Huang, Qinming He, Kevin Chiew, Jianan Wu, Yanzhe Che:
GMAC: A Seed-Insensitive Approach to Local Community Detection. DaWaK 2013: 297-308 - [c30]Feng Qian, Kevin Chiew, Qinming He, Hao Huang, Lianhang Ma:
Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph. PAKDD (1) 2013: 174-186 - [c29]Hao Huang, Yunjun Gao, Lu Chen, Rui Li, Kevin Chiew, Qinming He:
Browse with a social web directory. SIGIR 2013: 865-868 - [c28]Hao Huang, Yunjun Gao, Kevin Chiew, Qinming He, Lu Chen:
Commodity query by snapping. SIGIR 2013: 985-988 - 2012
- [j3]Feng Qian, Qinming He, Kevin Chiew, Jiangfeng He:
Spatial co-location pattern discovery without thresholds. Knowl. Inf. Syst. 33(2): 419-445 (2012) - [c27]Yanzhe Che, Kevin Chiew, Xiaoyan Hong, Qinming He:
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks. MobiGIS 2012: 49-56 - 2011
- [j2]Deshi Ye, Qinming He:
Worst-Case Performance Evaluation on Multiprocessor Task Scheduling with Resource Augmentation. Int. J. Found. Comput. Sci. 22(4): 971-982 (2011) - [j1]Dawei Huang, Deshi Ye, Qinming He, Jianhai Chen, Kejiang Ye:
Virt-LM: a benchmark for live migration of virtual machine (abstracts only). SIGMETRICS Perform. Evaluation Rev. 39(3): 18 (2011) - [c26]Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin:
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing. NPC 2011: 111-122 - [c25]Hao Huang, Qinming He, Jiangfeng He, Lianhang Ma:
RADAR: Rare Category Detection via Computation of Boundary Degree. PAKDD (2) 2011: 258-269 - [c24]Jianhai Chen, Dawei Huang, Bei Wang, Deshi Ye, Qinming He, Wenzhi Chen:
A Fine-Grained Performance-Based Decision Model for Virtualization Application Solution. TPCTC 2011: 180-195 - [c23]Dawei Huang, Deshi Ye, Qinming He, Jianhai Chen, Kejiang Ye:
Virt-LM: a benchmark for live migration of virtual machine. ICPE 2011: 307-316 - 2010
- [c22]Kejiang Ye, Xiaohong Jiang, Qinming He, Xing Li, Jianhai Chen:
Evaluate the Performance and Scalability of Image Deployment in Virtual Data Center. NPC 2010: 390-401
2000 – 2009
- 2009
- [c21]Jianhua Che, Qinming He, Kejiang Ye, Dawei Huang:
Performance Combinative Evaluation of Typical Virtual Machine Monitors. HPCA (China) 2009: 96-101 - [c20]Feng Qian, Qinming He, Jiangfeng He:
Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones. ICCSA (2) 2009: 677-692 - [c19]Jianhua Che, Qinming He, Yinggang Zhao, Feng Qian, Qi Chen:
Cluster Analysis and Fuzzy Query in Ship Maintenance and Design. ICIC (2) 2009: 458-467 - [c18]Deshi Ye, Hua Chen, Qinming He:
Load Balancing in Server Consolidation. ISPA 2009: 170-174 - [c17]Feng Qian, Qinming He, Jiangfeng He:
Mining Spatial Co-location Patterns with Dynamic Neighborhood Constraint. ECML/PKDD (2) 2009: 238-253 - 2008
- [c16]Deshi Ye, Qinming He, Hua Chen, Jianhua Che:
A Framework to Evaluate and Predict Performances in Virtual Machines Environment. EUC (2) 2008: 375-380 - [c15]Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang:
Performance Measuring and Comparing of Virtual Machine Monitors. EUC (2) 2008: 381-386 - [c14]Jiangfeng He, Qinming He, Feng Qian, Qi Chen:
Incremental Maintenance of Discovered Spatial Colocation Patterns. ICDM Workshops 2008: 399-407 - 2006
- [c13]Yinggang Zhao, Qinming He:
An Incremental Learning Algorithm Based on Support Vector Domain Classifier. IEEE ICCI 2006: 805-809 - [c12]Hua Chen, Jianfei Qian, Qinming He:
A P2P Architecture for Supporting Group Communication in CSCW Systems. CSCWD 2006: 199-203 - [c11]Qi Qiang, Qinming He:
A Multiclass Classification Framework for Document Categorization. Document Analysis Systems 2006: 474-483 - [c10]Qinming He, Jianfei Qian, Hua Chen, Fangzhong Qi:
Software Planned Learning and Recognition Based on the Sequence Learning and NARX Memory Model of Neural Network. IMSCCS (2) 2006: 429-432 - [c9]Qi Qiang, Qinming He:
A Multiclass Classification Method Based on Output Design. PAKDD 2006: 15-19 - [e1]Yueting Zhuang, Shiqiang Yang, Yong Rui, Qinming He:
Advances in Multimedia Information Processing - PCM 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings. Lecture Notes in Computer Science 4261, Springer 2006, ISBN 3-540-48766-2 [contents] - 2005
- [c8]Yinggang Zhao, Qi Chen, Qinming He:
An Interval Set Classification Based on Support Vector Machines. ICAS/ICNS 2005: 81 - [c7]Qinming He, Ling Qiu, Zhen He:
Design and Implementation of a J2EE-Based Platform for Network Teaching. ICWL 2005: 49-55 - [c6]Xizhi Li, Qinming He:
Frame Rate Control in Distributed Game Engine. ICEC 2005: 76-87 - [c5]Yangguang Liu, Qinming He:
Concept Updating with Support Vector Machines. WAIM 2005: 492-501 - 2004
- [c4]Yangguang Liu, Qi Chen, Yongchuan Tang, Qinming He:
An Incremental Updating Method for Support Vector Machines. APWeb 2004: 426-435 - [c3]Yangguang Liu, Qinming He, Yongchuan Tang:
Support vector pursuit learning. SMC (6) 2004: 5841-5846 - [c2]Qinming He, Ling Qiu, Guotao Zhao, Shenkang Wang:
Text Categorization Based on Domain Ontology. WISE 2004: 319-324 - 2001
- [c1]Shenkang Wang, Qinming He, Chunyang Yu:
MA-C: A Multimedia Instruction Model based on Multi-Agent and CSCW. CSCWD 2001: 520-522
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint